1. National Institute of Standards and Technology (NIST). (2020). Security and Privacy Controls for Information Systems and Organizations (Special Publication 800-53, Revision 5).
Section: Control RA-5 (Vulnerability Monitoring) and SI-2 (Flaw Remediation).
Details: NIST guidance emphasizes the need for organizations to "scan for vulnerabilities in the system... at the organization-defined frequency" (RA-5) and "remediate flaws within an organization-defined time period" (SI-2). The entire NIST Risk Management Framework (RMF) is predicated on prioritizing actions based on risk to organizational operations and assets.
2. Stanford University Information Security Office. (2023). Vulnerability Management Standard.
Section: Requirements, §2. Vulnerability Scanning and §4. Remediation.
Details: The standard mandates regular scanning of systems and requires that "remediation priority of identified vulnerabilities must be based on the risk they pose to the University." It explicitly states that risk rating should consider factors like CVSS score, threat intelligence, and asset exposure, directly supporting the principles in the correct answer.
3. Bozorgi, M., Saul, M., Jahromi, S. H., & Mozaffari-Kermani, M. (2022). On the Prioritization of Common Vulnerabilities and Exposures through Threat Intelligence. IEEE Transactions on Dependable and Secure Computing, 19(5), 3473-3487.
DOI: https://doi.org/10.1109/TDSC.2021.3092511
Details: This peer-reviewed article (Abstract, Section I) highlights the challenge of handling numerous vulnerabilities and argues for prioritization models that incorporate "real-world threat intelligence" alongside standard severity scores to focus remediation efforts on the most probable and impactful threats.